2020
DOI: 10.1111/cgf.14042
|View full text |Cite
|
Sign up to set email alerts
|

NEVA: Visual Analytics to Identify Fraudulent Networks

Abstract: Trust‐ability, reputation, security and quality are the main concerns for public and private financial institutions. To detect fraudulent behaviour, several techniques are applied pursuing different goals. For well‐defined problems, analytical methods are applicable to examine the history of customer transactions. However, fraudulent behaviour is constantly changing, which results in ill‐defined problems. Furthermore, analysing the behaviour of individual customers is not sufficient to detect more complex stru… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(17 citation statements)
references
References 41 publications
0
17
0
Order By: Relevance
“…While papers describe interactions at varying levels of detail, a few common interaction types emerged in our analysis, including selection (e.g., [KBJ∗20; WBL∗20]), filtering (e.g., [LGM∗20; PNKC20]), zooming (e.g., [LPH∗20; LSC∗18]), tuning weights/hyperparameters (e.g., [DSKE20; SLC∗20]), and annotation/labeling (e.g., [SSKE19; XXM∗19]). Multiple of these interaction types tend to be combined in a single system, for example when users first select a set of data instances before labeling them (e.g., [BHZ∗18; ZWLC19]).…”
Section: Dimensions Of Analysismentioning
confidence: 99%
See 3 more Smart Citations
“…While papers describe interactions at varying levels of detail, a few common interaction types emerged in our analysis, including selection (e.g., [KBJ∗20; WBL∗20]), filtering (e.g., [LGM∗20; PNKC20]), zooming (e.g., [LPH∗20; LSC∗18]), tuning weights/hyperparameters (e.g., [DSKE20; SLC∗20]), and annotation/labeling (e.g., [SSKE19; XXM∗19]). Multiple of these interaction types tend to be combined in a single system, for example when users first select a set of data instances before labeling them (e.g., [BHZ∗18; ZWLC19]).…”
Section: Dimensions Of Analysismentioning
confidence: 99%
“…Fraud Detection – In cooperation with a bank, Leite et al [LGM∗20] develop an environment to explore fraudulent behavior and state that “ trustability, reputation, security and quality are the main concerns for public and private financial institutions ” [LGM∗20]. They derive four design requirements with collaborating experts and evaluate the success of the system using four tasks, each targeting one requirement.…”
Section: Application‐specific Evaluationsmentioning
confidence: 99%
See 2 more Smart Citations
“…Overview visualization for finding frauds in a money transactions network [LGM19]. The analytical exploration of the network data is supported by allowing analysts to formulate only semantically relevant queries and make the analysis effective.…”
Section: Designing Guidance: Three Scenariosmentioning
confidence: 99%